Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for updating keys used for public key cryptography

A technology of public key and password, applied in the direction of public key of secure communication, transmission system, digital transmission system, etc., can solve the problem that the key cannot provide the security level PKC program, etc.

Active Publication Date: 2007-02-07
SAP AG
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another reason can be that the used keys do not provide the required level of security against breaches of the PKC program due to the development of new technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for updating keys used for public key cryptography
  • System and method for updating keys used for public key cryptography
  • System and method for updating keys used for public key cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following examples and descriptions are intended to illustrate embodiments of the present invention and not to limit the scope of the present invention.

[0022] figure 1 is a simplified diagram of an example embodiment of a providing system 100 and a receiving system 200 . An embodiment of the provisioning system 100 has two components, a computing unit 110 and a sending unit 120 . The embodiment of receiving system 200 also has two components, receiving unit 210 and authentication unit 210 . Arrows between two units in the figure represent interfaces between the two units for transferring data in the direction indicated by the arrows. Embodiments of the provisioning system 100 are applicable to embodiments in which the public key sequence is provided to the receiving system 200 in a secure manner. Each public key in the sequence is related to a private key and can be applied to public key cryptography (PKC) procedures. The PKC program applies the PKC method or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention includes a provider system (100) for providing a sequence of public keys to a receiver system (200), wherein each public key of the sequence is related to a private key and is applicable for a public key cryptography procedure. The provider system (100) comprises a computing unit (110) and a sending unit (120). The computing unit (110) is configured to: generate the sequence of public keys and related keys and compute a plurality of data sets, a data set of the plurality comprising a public key and a proof value. The proof values is a result of applying a hash function to a following data set comprising a further public key following in the sequence. The sending unit (120) is configured to provide the plurality of data to a receiver system (200).

Description

technical field [0001] The present invention relates generally to the field of electronic data processing, and more particularly to providing secure electronic transactions. Background technique [0002] In today's world, electronic communication has reached a high level. Parties such as individuals, companies or official agencies communicate using electronic infrastructures such as the Internet. It is thus often desirable that electronic transactions, ie the electronic exchange of data, be secure. For example, a secure transaction means that the sender of the document can be identified in a reliable manner, or that the document cannot be read by unauthorized persons who intercept the transmission of the document. [0003] A very effective way of providing this aspect of secure electronic transactions is through the use of public key cryptography (PKC). PKC involves a PKC method and a pair of complementary keys, including a public key and a private key associated with the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L29/06
CPCH04L2209/80H04L9/3236H04L9/0891H04L9/14H04L2209/56
Inventor 佐尔坦·诺赫塔
Owner SAP AG